greety the greety

2
PROPOSED SYSTEM In the proposed system, this work is enhanced by including the nodes and increasing the number of nodes when needed and making the nodes to be in the mobility state. The intruder will be present inbetween the nodes that is said to be the source and the destination. The process of isolating the intruder or the compromised node could increase the number of hop count, which would further increases the delay in data delivery. Hence, node replacements strategies have to be analyzed carefully. In addition, we need to calculate the amount of overhead involved in our proposed scheme. ARCHITECTURE DIAGRAM

Upload: rajakumar-srinivasan-vadamalai

Post on 20-Dec-2015

213 views

Category:

Documents


0 download

DESCRIPTION

Thanks for uploading to Scribd in the past! To make Scribd an active and valuable community, we ask users to upload one quality document for every one they download.

TRANSCRIPT

Page 1: Greety the Greety

PROPOSED SYSTEM

In the proposed system, this work is enhanced by including the nodes and increasing the

number of nodes when needed and making the nodes to be in the mobility state. The

intruder will be present inbetween the nodes that is said to be the source and the

destination. The process of isolating the intruder or the compromised node could

increase the number of hop count, which would further increases the delay in data

delivery. Hence, node replacements strategies have to be analyzed carefully. In addition,

we need to calculate the amount of overhead involved in our proposed scheme.

ARCHITECTURE DIAGRAM

Page 2: Greety the Greety